Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

SANS/REN-ISAC Summer 2024 Program Overview

This webcast will provide a detailed overview of all the products and pricing offered to accredited educational institutions, in the US and Canada through the SANS EDU Summer Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.

WebinarCyber Defense
Webcast Abstract Image
  • 29 May 2024
  • 14:00 UTC
View details

SANS/CIS Summer 2024 Program Overview

This webcast will provide a detailed overview of all the products and pricing offered to qualified state, provincial and local government organizations, in the US and Canada through the SANS SLTT Government’s Aggregate Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.

WebinarCyber Defense
Webcast Abstract Image
  • 30 May 2024
  • 14:00 UTC
View details

Ransomware Summit Solutions Track 2024

It’s 2024. Ransomware is no longer new, the threats and risks are well known, the cases and payouts are public. Even with this ominous threats, why are security teams still caught off guard when their environments fall victim? It’s 2024 - the year we stop waiting for the adversary.

WebinarCyber Defense
Webcast Abstract Image
  • 31 May 2024
  • 10:00 UTC
  • Matt Bromiley
View details

Unlocking Secrets - An Exploration of PulseView & Side-Channel Timing Attacks

In this intro to hardware hacking we'll introduce you to PulseView - the 'Wireshark of hardware hacking' and we'll unveil a technique behind unlocking a keypad safe, relying solely on its user interface.Our approach? A Side-Channel Timing Attack.

WebinarCybersecurity and IT Essentials
Webcast Abstract Image
  • 3 Jun 2024
  • 17:30 GST
  • Monta Elkins
View details

Exploring the Link Between Corruption and Cybercrime

We are confronted by so many cyber threat actors, with the primary focus being on external threats, and when it comes to internal threats, the focus is often on internal negligence. But the reality is we are seeing in more and more cases that external threat actors are actually simply corrupting internal staff members, often in trusted IT and security positions, to overcome even the most sophisticated cyber security systems.

WebinarCybersecurity and IT Essentials
Man presenting webcast to laptop screen
  • 3 Jun 2024
  • 17:30 AST
  • Jason Jordaan
View details

How To Upgrade Your Cybersecurity Risk Assessments

Everyone looks forward to and loves an upgrade. An upgrade to a suite in a hotel or an upgrade to first class for a flight always makes for a much more enjoyable trip.

WebinarCybersecurity Leadership
Webcast Abstract Image
  • 4 Jun 2024
  • 13:00 UTC
  • Russell Eubanks
View details

SANS 2024 Application Security & API Survey: Protecting our Applications and APIs

Our applications and APIs are the gateways to our most sensitive and valuable data. As such, application and API security has become more and more essential to protecting our organizations. On this webcast, SANS certified instructor David Hazar will review the results of our 2024 AppSec/DevSecOps survey, and provide insight into:The best way to provide API securityInvestment trends in automated testing technologiesWhich tests are more important or more effective for APIsRegister for this webcast now, and you will automatically receive the companion white paper upon publication.

WebinarSecurity Awareness
Webcast Abstract Image
  • 5 Jun 2024
  • 10:30 UTC
  • David Hazar, Pablo Estrada & Jonny Stewart
View details

Evolution of SIEM in the Cloud

In recent times, the landscape of Security Information and Event Management (SIEM) solutions has experienced a remarkable metamorphosis. No longer confined to being mere data repositories, SIEM platforms have evolved into dynamic hubs brimming with invaluable insights. Join us in this webcast as we embark on a journey through the contemporary realm of SIEM, spotlighting its departure from traditional methodologies, shifting to the cloud, and its embrace of cutting-edge technologies like Artificial Intelligence (AI) and machine learning.

WebinarCloud Security
Webcast Abstract Image
  • 6 Jun 2024
  • 10:00 UTC
  • Chris Edmundson
View details

ランサムウェアのランドスケープへのいざない:2023年からの教訓

近年、ランサムウェア攻撃は、個人や企業のみならず、重要インフラをも標的とする大きなな脅威へと進化しています。2023年はランサムウェアにとって大きな年であり、2024年もその勢いが衰えるとは考えられません。このプレゼンテーションでは、ランサムウェアの現状、攻撃時によく見られる手口やテクニック、2023年のランサムウェア攻撃への対応から得られた教訓を包括的にご紹介します。

WebinarCyber Defense
Webcast Abstract Image
  • 9 Jun 2024
  • 13:00 UTC
  • Phill Moore
View details

The Achilles Systems Hack Assessment Series: Getting Strategic with Vulnerability Management - Part 3 of 4 for Operational Leadership

In this webcast, we will quickly review the incident affecting Achilles Systems, including their basic “block and tackle” approach to vulnerability management.

WebinarCybersecurity Leadership
Webcast Abstract Image
  • 10 Jun 2024
  • 13:00 UTC
  • Jonathan Risto
View details

An Intro to C for Windows - Part 9: Can you C the Internet!

How do applications download Internet resources like files, how are specific requests crafted like GET and POST, how are headers and user agent strings created? This part of the series will answer all of those questions by introducing two Win32 libraries: WinHttp and WinINet.

WebinarOffensive Operations
Man presenting webcast to laptop screen
  • 10 Jun 2024
  • 15:00 UTC
  • Jonathan Reiter
View details

Wings of Innovation: Transitioning to Containerization – Aviata Cloud Solo Flight Challenge Chapter 3

Embark on a journey through the skies of Kubernetes as we navigate the fundamentals, deployment strategies, and security for a seamless transition from traditional cloud instances to containerized infrastructure.

WebinarCloud Security
Two people presenting a webcast
  • 13 Jun 2024
  • 10:00 UTC
  • Ahmed Abugharbia
View details